USER AUTHENTICATION
    1.
    发明公开
    USER AUTHENTICATION 审中-公开

    公开(公告)号:US20240073207A1

    公开(公告)日:2024-02-29

    申请号:US18256439

    申请日:2021-11-25

    IPC分类号: H04L9/40

    CPC分类号: H04L63/0861 H04L63/107

    摘要: A computer implemented method for authenticating a user, the method including receiving an authentication request from a first computer system, the authentication request including an indication of an identity of the user to be authenticated; receiving one or more authentication factors for verifying the identity of the user, the one or more authentication factors including at least one authentication factor obtained from a second computer system associated with the user having the indicated identity; receiving an auxiliary authentication factor, the auxiliary authentication factor comprising data for verifying that the second computer system is currently in the possession of the user having the indicated identity; and verifying the identity of the user based on the one or more authentication factors and the auxiliary authentication factor.

    EVOLUTIONARY NETWORK RE-CONFIGURATION
    2.
    发明公开

    公开(公告)号:US20230216744A1

    公开(公告)日:2023-07-06

    申请号:US18000860

    申请日:2021-06-02

    摘要: A computer implemented method of adapting a configuration of a software defined network to improve a measure of network performance towards an objective measure of performance, the network including a plurality of network nodes communicating via the network, the method including each node applying an evolutionary algorithm to generate a candidate adjusted configuration for the network and, responsive to a determination that the candidate provides an improvement to the measure of network performance, the node storing the candidate in a distributed database accessible to the nodes for access by other nodes; each node accessing candidate adjusted configurations in the distributed database and determining a performance of the network provided by each accessed candidate, wherein each node records the determined performance provided by a candidate in the database in association with the candidate, such that a candidate adjusted configuration providing a greatest improvement to the measure of network performance is selected by the nodes for adapting the configuration of the network.

    PAIRING OF USER DEVICE WITH REMOTE SYSTEM
    3.
    发明公开

    公开(公告)号:US20230189003A1

    公开(公告)日:2023-06-15

    申请号:US17926502

    申请日:2021-05-14

    IPC分类号: H04W12/50 H04L9/08

    摘要: A method of pairing a user device with a remote system. The user device communicates with an intermediary device via a secure communication channel to cause a secret key generated by the remote system to be received by the user device, from the intermediary device. The secret key is thereby assigned to the user device. The user device establishes communication with the remote system to pair the user device with the remote system using the secret key, such that data sent from the user device to the remote system is encrypted using the secret key and data received by the user device from the remote system is decrypted using the secret key.

    RESOURCE ACCESS CONTROL
    4.
    发明申请

    公开(公告)号:US20220376902A1

    公开(公告)日:2022-11-24

    申请号:US17753774

    申请日:2020-09-11

    IPC分类号: H04L9/08

    摘要: There is provided a computer implemented method for accessing a resource at a computing device, as well as for controlling access to a resource by a computing device. The computing device receives a policy indicating a set of conditions under which access to the resource is permitted, determines whether each of the conditions are initially present based on an output of one or more sensors of the device, and monitors the one or more sensors to detect a change in the presence of one or more of the conditions. In response to detecting the change in the presence of one or more of the conditions, the computing device determines whether each of the conditions are present. In response to determining that each of the conditions is present, access to the resource is enabled. If at least one of the conditions is not present, access to the resource is prevented.

    USER AUTHENTICATION BASED ON BEHAVIORAL BIOMETRICS

    公开(公告)号:US20220261466A1

    公开(公告)日:2022-08-18

    申请号:US17597629

    申请日:2020-06-16

    IPC分类号: G06F21/32 G06F21/31

    摘要: Computer implemented methods for enrolling a user as an authenticated user of a computing device and for authenticating a user of a computing device are provided. The methods make use of behavioral biometrics to determine a set of shares that represent a secret credential according to a secret sharing scheme. The set of shares is initially determined when the user is enrolled based on typical measurements of the user's behavioral biometrics and authentication data indicating how to generate the set of shares from a user's behavioral biometrics is generated. When authenticating the user, the computing device can generate the set of shares based on the authentication data and measurements of the current user's behavioral biometrics. The computing device can use the generated set of shares to recreate a copy of the secret credential with which to authenticate the user.

    ACCESS CONTROL CLASSIFIER TRAINING

    公开(公告)号:US20220164422A1

    公开(公告)日:2022-05-26

    申请号:US17310969

    申请日:2020-02-28

    IPC分类号: G06F21/31 G06N20/00

    摘要: A computer implemented method of access control for a user device having at least one component for determining behaviours of the user, the method comprising: defining a training period during which access to the device is determined based on a credential-based authentication scheme wherein each access determination is used to generate an item of training data including at least a result of the credential-based authentication and a behaviour of the user; training a machine learning classifier based on the training data such that the classifier is operable to classify user behaviour as compliant or non-compliant such that compliant behaviour is determined by the classifier to be consistent with prior behaviour for permitting access to the device subsequent to the training period; and responsive to a determination that a behaviour subsequent to the training period is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behaviour as a compliant behaviour by providing the subsequent behaviour as an additional training example.

    ACCESS CONTROL
    7.
    发明申请

    公开(公告)号:US20220156351A1

    公开(公告)日:2022-05-19

    申请号:US17310972

    申请日:2020-02-28

    IPC分类号: G06F21/31 G06N20/00

    摘要: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant such that compliant behavior is determined by the classifier to be consistent with prior behavior for permitting access to the device. The method further includes, in response to a determination that a subsequent behavior is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behavior as a compliant behavior by providing the subsequent behavior as an additional training example.

    MULTI-LEVEL CLASSIFIER BASED ACCESS CONTROL

    公开(公告)号:US20220100829A1

    公开(公告)日:2022-03-31

    申请号:US17310968

    申请日:2020-02-28

    IPC分类号: G06F21/31 G06F21/45

    摘要: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a first machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant. The method further including, in response to a determination that a subsequent behavior is classified as non-compliant, accessing a second machine learning classifier trained based on at least one prior behavior of the user using the device where the prior behavior is classified as non-compliant by the first classifier. The method further including, in response to a determination that the subsequent behavior is classified as non-compliant by the second classifier, requesting a credential-based authentication of the user and constructively training one of the machine learning classifiers based on the credential-based authentication result